Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

With all the talk about security certifications and working in IT security being hot right now and in the future, I was wondering if it would make more sense to try and get the Security + certification before trying to get another IT certification such as the MCSA (Microsoft Certified Systems...

Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it....

Hi all, What do you recommend for initial password issue, that is, provided a new user with a password for the first time without compromising it. I find the entire help desk giving password initially or sysadmins doing that is not save enough even though the user will be prompted to change it at...

I am currently in the process of deploying Symantec AntiVirus Corporate edition in my Windows-based network. In the manual it states, Do not install the primary management server on the following: Miscrosoft Exchange Server, Web server, or programs that prevent you from restarting the computer at...

I am looking for a solution wich will allow me to revert computers setting back to original each time computer reboots. Basically on reboot computer will earse all files and configurations made in previous session.

We have several appliances performing specialized tasks in our environment. I've been asked to perform an audit of these appliances. Since most of these appliances run a version of Linux/Unix I've decided to audit in a two phase process. First looking at the OS/Kernel and then the application. My...

Hello All, Someone is having problems sending emails to us which did not exist before. Our email server (Unix based) did not list his domain as spam according to our email technician. Also for troubleshooting purposes i've asked him to send to my hotmail account which resulted in the same manor not...

I get this message from my router every 2 minuets or so. I tried blocking to ports that it attacks and the IP but the major issue is that, that IP is a broadcast IP, so i don't know where it is coming from. What my question is, is how do is stop these alerts (short of removing my e-mail from the...

I work at a company that currently does not have a position dedicated to information security. I come from a background in networking with a good portion of my focus on firewalls and other security related technologies. I am interested in positioning myself into the role of InfoSec Admin at my...

Hello, I have an online training application that allows users to connect anonymously but then requires them to authenticate with their Notes username and password after completing required courses. About 8% bomb because they enter their network username and password instead of the Notes username...

i have an sbs 2003 with exchange runing on it and gut a public folder that i've created for general mail to the employee's. i've routed all mail to that folder from specific account, the problem is that the mail's arrived as a IPM.POST format mails and not like the traditional mails that is more...

We are currently attempting to implement a Blue Socket Gateway in order to authenticate our wireless clients. I have been instructed by Blue Socket that the certificate used by them will not work through a NAT translation and that I should put this device on the outside of my ASA firewall....

I've been hearing more about XSRF (cross-site request forgery) attacks. (Netflix most recently had to fix a flaw related to this.) I'm wondering how you can prevent this type of attack. Do Web application firewalls work?

Hello everyone. Computer A crashed unexpectly. It turned out to be the motherboard but what im concerned with is the hard drive. I put the hard drive from computer A into a spare IDE slot on computer B. I booted computer B with computer B's own hard drive and attempted to grab the files i needed...

We have a Windows 2003 IIS server setup behind our firewarll which is a PIX firewall. What is the best method to establish a secure FTP site on this IIS server? I have reviewed this topic on the internet and actually talked with somebody from IPSWITCH and the best method available is to purchase a...

I know that there is quite a bit in the discussion groups about cached Domino internet passwords but nothing seems to really point to a definitive solution, so I am turning to this group to see if an answer has been found. 2 Questions: - do you know how to force the clearing or know where this...

To follow this tag...

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy